Category: CyberSecurityNews

Telegram Web App Vulnerability Let Attackers Hijack Sessions
29
Apr
2024

Telegram Web App Vulnerability Let Attackers Hijack Sessions

A new vulnerability has been discovered in Telegram, allowing a threat actor to hijack a Telegram user session via XSS…

IcedID Infection to Dagon Locker Ransomware
29
Apr
2024

29-Days From IcedID Infection to Dagon Locker Ransomware Deployment

In a sophisticated cyberattack that unfolded over 29 days, cybersecurity analysts have meticulously traced the steps of threat actors from…

Find Malware With ANY RUN Threat Intelligence YARA Search by File Contents
29
Apr
2024

Find Malware With ANY RUN Threat Intelligence YARA Search

YARA is a rule-based malware detection tool that utilizes regular expressions and textual/binary signatures to create descriptions (rules) for identifying…

Dependency Confusion Vulnerability Found in an Archived Apache Project 
29
Apr
2024

Dependency Confusion Vulnerability Found in an Archived Apache Project 

Researchers discovered a vulnerability in an archived Apache project, highlighting the risk of using outdated third-party dependencies, where attackers can…

Hackers Abuse Autodesk Drive For Hosting Weaponized PDF Files
26
Apr
2024

Hackers Abuse Autodesk Drive For Hosting Weaponized PDF Files

Autodesk Drive is a data-sharing platform for organizations to share documents and files in the cloud. It also supports 2D…

Cactus Ransomware Exploiting Qlik Servers Vulnerability
26
Apr
2024

Cactus Ransomware Exploiting Qlik Servers Vulnerability

The Cactus ransomware gang has been exploiting vulnerable Qlik sense servers ever since November 2023 using multiple vulnerabilities such as…

Chrome Critical Flaw Let Attackers Execute Arbitary Code : Patch Now
26
Apr
2024

Chrome Critical Flaw Let Attackers Execute Arbitary Code : Patch Now

Google announced the release of Chrome 124, which fixes four vulnerabilities, including a critical security issue that allows attackers to execute…

MS-DOS 4.0
26
Apr
2024

Microsoft Releases Historical MS-DOS 4.0 Source Code

In a significant move for tech enthusiasts and historians alike, Microsoft has made the source code for MS-DOS 4.0 publicly…

MuddyWater Hackers Abusing Legitimate RMM Tool to Deliver Malware
26
Apr
2024

MuddyWater Hackers Abusing RMM Tool to Deliver Malware

The Iranian state-sponsored threat actor MuddyWater has been observed exploiting a legitimate remote monitoring and management (RMM) tool, Atera Agent,…

Hackers Actively Exploiting WP Automatic Updates Plugin Flaw
26
Apr
2024

Hackers Actively Exploiting WP Automatic Updates Plugin Flaw

Hackers often target WordPress plugins as they have security loopholes that they can exploit to hack into sites without permission. …

PoC Exploit Released For Critical Flowmon Vulnerability
26
Apr
2024

PoC Exploit Released For Critical Flowmon Vulnerability

Progress addressed a critical vulnerability last week, which was associated with an unauthenticated Command injection on the Progress Flowmon product….

Hackers Exploit Google Ads to Spread IP Scanner with Concealed Backdoor
25
Apr
2024

Hackers Exploit Google Ads to Spread IP Scanner with Concealed Backdoor

Malicious actors are distributing a new backdoor, MadMxShell, through a Google Ads campaign that impersonates an IP scanner. This Windows…